-
Data Security
Mar 29, 2020
How Major Companies Find Leaks
Serious data leaks are increasingly prevalent in the news. We mostly hear about the immediate impact of those leaks and the steps taken to fix them, but how much do we actually know about how companies find and prevent these leaks?
Rob Sobers
1 min read
-
Security Bulletins
Mar 29, 2020
Varonis Brings Data Security to Nasuni Cloud NAS
We’re excited to announce that, in an upcoming release, the Varonis Data Security Platform will bring data-centric audit and protection to Nasuni Enterprise File Services. Nasuni is a key Varonis partner in the growing market for hybrid cloud Network Attached Storage (NAS).
Rob Sobers
1 min read
-
Data Security
Mar 29, 2020
Brute Force: Anatomy of an Attack
The media coverage of NotPetya has hidden what might have been a more significant attack: a brute force attack on the UK Parliament. While for many it was simply fertile ground for Twitter Brexit jokes, an attack like this that targets a significant government body is a reminder that brute force remains a common threat to be addressed.
Ofer Shezaf
6 min read
-
Privacy & Compliance
Mar 29, 2020
We Need to Talk About Gramm-Leach-Bliley (GLB): The Safeguards Rule Will Be Changing!
As a blogger following data security laws and regulations, I’m occasionally rewarded with an “I told you this law would be important” moment. Earlier this month with the news that the FTC plans to update its dusty Gramm-Leach-Bliley Act regulations for data security. To refresh memories, GLBA covers data security and privacy practices of the US financial industry — banks, investment firms, mortgage lenders, financial advisors, consumer lenders, and more.
Michael Buckbee
6 min read
-
Data Security
Mar 29, 2020
Koadic: Pen Testing, Pivoting, & JavaScripting, Part II
This article is part of the series "Koadic Post-Exploitation Rootkit". Check out the rest: Koadic: LoL Malware Meets Python-Based Command and Control (C2) Server, Part I Koadic: Pen Testing, Pivoting, & JavaScripting, Part II Koadic: Implants and Pen Testing Wisdom, Part III Koadic: Security Defense in the Age of LoL Malware, Part IV
Michael Buckbee
5 min read
-
Active Directory Data Security
Mar 29, 2020
Active Directory Domain Services (AD DS): Overview and Functions
Active Directory Domain Services (AD DS) are the core functions in Active Directory that manage users and computers and allow sysadmins to organize the data into logical hierarchies.
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
The Future of Cybersecurity Budgeting
Major data breaches from the past few years are reminders that cybersecurity can’t remain an afterthought when it comes to budgeting priorities. The threat landscape is expanding and the likelihood of a cyber attack is high. Luckily, more companies are taking their strategy seriously since investments in cybersecurity budgets increased by 141 percent between 2010 and 2018.
Michael Buckbee
1 min read
-
Data Security
Mar 29, 2020
What is Security Analytics? Guide for the Non-Analytical
Security analytics is the practice of analyzing raw security data to discover preemptive and actionable security measures to increase cybersecurity. It’s not necessarily a particular technique, but certainly involves aggregating data from many possible sources: event logs from operating systems, firewalls, routers, virus scanners,and more. And then combining or correlating them to produce a cleaner data set that can then be processed with appropriate algorithms.
Michael Buckbee
4 min read
-
Data Security
Mar 29, 2020
The Difference between a Computer Virus and Computer Worm
Viruses and worms are often used interchangeably: there are a few key differences in how they work. Both viruses and worms are a type of malware: a worm is a type of virus.
Michael Buckbee
2 min read
-
Data Security
Mar 29, 2020
Do Executives and Cybersecurity Pros Agree on Today’s Biggest Cyber Threats?
Breaches cost companies billions, erode trust and can have a long-lasting negative impact on a company’s brand. With so much as stake, we wondered: are C-Suite executives aligned with their security and IT pros when it comes to cybersecurity?
Rachel Hunt
2 min read
-
Data Security
Mar 29, 2020
What is SAML and How Does it Work?
Security Assertion Markup Language (SAML) is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers (SP). What that jargon means is that you can use one set of credentials to log into many different websites. It’s much simpler to manage one login per user than it is to manage separate logins to email, customer relationship management (CRM) software, Active Directory, etc.
Michael Buckbee
3 min read
-
Data Security
Mar 29, 2020
How Honeypots Unmask Hackers & Scammers Online
A honeypot is a tool that acts as bait, luring an attacker into revealing themselves by presenting a seemingly tempting target. While advanced honeypots are designed to make it easier to detect and study the kinds of attacks hackers use in the wild, modern honeypots based on tracking URL’s have evolved to be so flexible and user-friendly that average people often use them to identify online scammers.
Kody Kinzie
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital